1. Aran Chindaudom, Prarinya Siritanawan, Karin Sumongkayothin, and Kazunori Kotani., ''Surreptitious Adversarial Examples through Functioning QR Code'', Journal of Imaging, vol. 8(5), pages 122, 2022. (corresponding author)

  2. Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, and Komwut Wipusitwarakun., ''Recursive Matrix Oblivious RAM: An ORAM construction for constrained storage device'', IEEE Transactions on Information Forensics and Security, vol. 12, pages 3024 - 3038, 2017. (corresponding author)

  3. Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, ''A Matrix Based ORAM: Design, Implementation and Experimental Analysis'', IEICE Transactions, vol. 99-D(8), pages 2044 – 2055, 2015. (corresponding author)

  1. Kasidit Chunhachatchawhankhun, Karin Sumonkayothin, Prarinya Siritanawan, and Kazunori Kotani, ''Investigating Protection of Deep Learning Visual Features on ECB Encrypted Images'', Proceeding in International Conference on KNOWLEDGE AND SYSTEMS ENGINEERING (KSE2021), pages 1-13, November 2021, Bangkok, Thailand.

  2. Aran Chindaudom, Pongpeera Sukasem, Poomdharm Benjasirimonkol, Karin Sumonkayothin, Prarinya Siritanawan, and Kazunori Kotani, ''AdversarialQR Revisited: Improving the Adversarial Efficacy'', Proceeding in International Conference on Neural Information Processing (ICONIP 2020), pages 799 - 806, November 2020, Bangkok, Thailand.

  3. Aran Chindaudom ,Karin Sumongkayothin, Prarinya Siritanawan, and Kazunori Kotani, ''AdversarialQR:An adversarial patch in QR code format'', Proceeding in International Conference on Imageing, Vision& Pattern Recognition (IVPR 2020), pages 1 - 7, January 2020, Fukuoka, Japan.

  4. Karin Sumongkayothin, Pakpoom Rachtrachoo, Arnuphap Yupuech, and Kasidit Siriporn, ''OVERSCAN:OAuth 2.0 Scanner for Missing Parameters'', Proceeding in International Conference on Network andSystem Security (NSS 2018), pages 221 - 233, December 2019, Sapporo, Japan.

  5. Karin Sumongkayothin, ''M-ORAM Revisited: Security and Construction Updates'', Proceeding in International Conference on Information Security Practice and Experience (ISPEC 2018), pages 521 - 532, September 2018, Tokyo, Japan.

  6. Karin Sumongkayothin, Steven Gordon, Atsuko Miyaji, Chunhua Su, Komwut Wipusitwarakun, ''Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space'', Proceeding in 6th International Conference of Applications and Techniques in Information Security (ATIS), pages 130 - 141, October 2016, Cairns, QLD, Australia.

  7. Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, ''Security and experimental performance analysis of a matrix ORAM'', Proceeding in IEEE International Conference on Communications (ICC), pages 1 - 6, May 2016, Kuala Lumpur, Malaysia. (corresponding author)

  8. Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, ''Analysis of Path ORAM toward Practical Utilization'', Proceeding in 18th International Conference on Network-Based Information Systems, pages 646 - 651, September 2015, Taipei, Taiwan. (corresponding author)

  9. Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, ''M-ORAM: A Matrix ORAM with Log N Bandwidth Cost'', Proceeding in 16 th World Conference on Information Security Applications (WISA), pages 3 - 15, August 2015, Jeju Island, Korea. (corresponding author)